This article outlines a strategic roadmap for organisations beginning on their digital transformation journey. It walks through the key phases – assessment, goal setting, pilot testing, scaling and covering cultural change and compliance – offering insights into aligning technology adoption with long-term business objectives. It emphasises change management and stakeholder… Continue Reading Digital Transformation Roadmap: From Legacy to Innovation

In the past few months, I have been sharing my views about cybersecurity myths – some of them held by the public, and some myths are still held (and propagated) by cybersecurity professionals and companies. One that may have been true at one time, but is no longer the case,… Continue Reading Cybersecurity Myths – the perimeter is the protection

In my recent theme of breaking common cybersecurity myths, I have been revealing some commonly held beliefs that even cybersecurity professionals will stand by. Today, I will look at the “most common passwords” and challenge whether they really are as common as we are told. Most common passwords A quick… Continue Reading Cybersecurity Myths – people use bad passwords

For anyone working in Cybersecurity, it can be hard to convince your board to understand the issues, and to invest money or focus on Cyber Security issues. I have presented Cyber issues to multiple Boards, and here is my advice on how to get Boards to understand Cybersecurity issues –… Continue Reading Cybersecurity for boards – analogy to Health & Safety

Even with the gradual increase in cybersecurity literacy amongst the masses, there are still some myths that people follow religiously, even Cybersecurity professionals. I will set out to bust some of those myths here. Many of the myths have come from companies advertising products as a “silver bullet” solution, some… Continue Reading Cybersecurity Myths – my home network is safe

Even with the gradual increase in cybersecurity literacy amongst the masses, there are still some myths that people follow religiously, even Cybersecurity professionals. I will set out to bust some of those myths here. Many of the myths have come from companies advertising products as a “silver bullet” solution, some… Continue Reading Cybersecurity Myths – my password use does not matter

Even with the gradual increase in cybersecurity literacy amongst the masses, there are still some myths that people follow religiously, even Cybersecurity professionals. I will set out to bust some of those myths here. Many of the myths have come from companies advertising products as a “silver bullet” solution, some… Continue Reading Cybersecurity Myths – phones are safe

Even with the gradual increase in cybersecurity literacy amongst the masses, there are still some myths that people follow religiously, even Cybersecurity professionals. I will set out to bust some of those myths here. Many of the myths have come from companies advertising products as a “silver bullet” solution, some… Continue Reading Cybersecurity Myths – changing passwords

Even with the gradual increase in cybersecurity literacy amongst the masses, there are still some myths that people follow religiously, even Cybersecurity professionals. I will set out to bust some of those myths here. Many of the myths have come from companies advertising products as a “silver bullet” solution, some… Continue Reading Cybersecurity Myths – It’s not my responsibility

Even with the gradual increase in cybersecurity literacy amongst the masses, there are still some myths that people follow religiously, even Cybersecurity professionals. I will set out to bust some of those myths here. Many of the myths have come from companies advertising products as a “silver bullet” solution, some… Continue Reading Cybersecurity Myths – I’ve got a firewall

Even with the gradual increase in cybersecurity literacy amongst the masses, there are still some myths that people follow religiously, even Cybersecurity professionals. I will set out to bust some of those myths here. Many of the myths have come from companies advertising products as a “silver bullet” solution, some… Continue Reading Cybersecurity Myths – I’m not a target

Creation of good policies and procedures is an art that can be helped with some core advice. Policies are the backbone of how a business tells their employees how to act and react, and ensures consistency and productivity. A great company culture, a consistent vision and values, and compliance with… Continue Reading Creating good policies and procedures

Yesterday, there was a world-wide incident that affected computers running CrowdStrike Falcon, where there was a conflict between the vendor’s anti-malware protection and the Windows sensor, resulting in a BSOD and unresponsive computers. This is a major incident that was effectively the effective impact as we were expecting from the… Continue Reading Lessons from the CrowdStrike incident

On International Women’s Day, I am reminded of the need for diversity in the workforce, and want to pose the question of what does diversity mean to you? Diversity is not just the inclusion of other races, genders and backgrounds. More than just a blind quota of non-white, non cisgender,… Continue Reading What does diversity mean to you?

Terminology around privacy and security often will use the term “PII” – to refer to “Personally Identifiable Information”. However, PII in Australia is not a valid term – the definition by the OAIC is “personal information”, and it differs from the US term (from NIST) and the legal obligations around… Continue Reading PII in Australia and personal information

Hey there! Ask me anything!